Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[LG-241] Add feature specs for piv/cac #2157

Merged
merged 1 commit into from
May 17, 2018

Conversation

jgsmith-usds
Copy link
Contributor

@jgsmith-usds jgsmith-usds commented May 11, 2018

Why:
We want to know how user flows work
with the piv/cac feature.

How:
We add feature tests for various flows.

Hi! Before submitting your PR for review, and/or before merging it, please
go through the following checklist:

  • For DB changes, check for missing indexes, check to see if the changes
    affect other apps (such as the dashboard), make sure the DB columns in the
    various environments are properly populated, coordinate with devops, plan
    migrations in separate steps.

  • For route changes, make sure GET requests don't change state or result in
    destructive behavior. GET requests should only result in information being
    read, not written.

  • For encryption changes, make sure it is compatible with data that was
    encrypted with the old code.

  • For secrets changes, make sure to update the S3 secrets bucket with the
    new configs in all environments.

  • Do not disable Rubocop or Reek offenses unless you are absolutely sure
    they are false positives. If you're not sure how to fix the offense, please
    ask a teammate.

  • When reading data, write tests for nil values, empty strings,
    and invalid formats.

  • When calling redirect_to in a controller, use _url, not _path.

  • When adding user data to the session, use the user_session helper
    instead of the session helper so the data does not persist beyond the user's
    session.

  • When adding a new controller that requires the user to be fully
    authenticated, make sure to add before_action :confirm_two_factor_authenticated.

Copy link
Contributor

@davemcorwin davemcorwin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM w one comment below

@@ -28,6 +27,10 @@ def delete

private

def create_nonce
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should this duplicated noncense be in a service object?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'll put that into a concern since it accesses the user_session which probably needs the controller object context.

@jgsmith-usds jgsmith-usds force-pushed the jgs-lg-241-feature-tests-for-piv-cac branch 2 times, most recently from e738979 to 71a84a9 Compare May 17, 2018 15:27
**Why**:
We want to know how user flows work
with the piv/cac feature.

**How**:
We add feature tests for various flows.
@jgsmith-usds jgsmith-usds force-pushed the jgs-lg-241-feature-tests-for-piv-cac branch from aa12cde to 8dec540 Compare May 17, 2018 17:13
@jgsmith-usds jgsmith-usds merged commit 0cb778a into master May 17, 2018
@jgsmith-usds jgsmith-usds deleted the jgs-lg-241-feature-tests-for-piv-cac branch May 17, 2018 17:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants